Top 10 in 2014: Internal audit considerations for technology companies. kpmg.com

Size: px
Start display at page:

Download "Top 10 in 2014: Internal audit considerations for technology companies. kpmg.com"

Transcription

1 Top 10 in 2014: Internal audit considerations for technology companies kpmg.com

2

3 CONTENTS Introduction 2 New sources of revenue growth 4 Managing costs 5 Information technology 6 Risk management/regulatory compliance 10 About KPMG 14

4 2 Top 10 in 2014: Internal audit considerations for technology companies Introduction Our annual compilation of internal audit considerations for technology companies, Top 10 in 2014, focuses on the critical role internal audit can play in helping companies manage some of their leading risks more effectively in today s dynamic environment. In this year s publication, you will notice a set of ongoing focus areas which are consistent with those in These include the following: Mergers, acquisitions, and integration; Intellectual property protection; and Foreign Corrupt Practices Act and Antibribery and Corruption compliance. We also included a section on System implementation and upgrades, which is not an emerging area but one that we see as a continued focus area for internal audit organizations. We have also included in this publication the emerging focus areas for 2014 based on our research and discussions. These include the following: COSO 2013 framework; Cloud service management; Global mobility workforce; IT asset management; Data analytics and continuous auditing/ monitoring; and Contingent workforce. The areas of data analytics and COSO 2013 Framework are key internal audit focus areas. The remaining ongoing and emerging risk areas are internal audit focus areas related to business risks. Our selection of risk areas is based on a number of inputs, including: Discussions with chief audit executives at technology companies KPMG s Technology Internal Audit share forum Insights from KPMG s professionals who work with technology companies, and KPMG s survey data.

5 Top 10 in 2014: Internal audit considerations for technology companies 3 In addition, we wanted to briefly identify the changes that will result from the forthcoming revenue standard. In many cases, these changes will result in implementation challenges, particularly for businesses that currently recognize revenue in accordance with industry-specific guidance. In addition, companies with customer contracts containing diverse terms and conditions, or arrangements with varying goods or services delivered over longer periods of time may also face challenges in implementing the standard. The implementation challenges could have far-reaching effects, potentially requiring changes not just to accounting policies but also to income tax reporting and compliance, information technology systems, internal controls, business processes, and other business practices. As such, internal controls will be a key consideration. Design and implementation of appropriate internal controls over the process used to derive the transition adjustment and the ongoing process changes put in place as part of the implementation of the new standard are important considerations. Companies will need to critically assess the revised processes and system changes to appropriately identify risk points and help ensure that internal controls are designed and implemented to mitigate these risks. When implementing changes to the internal control structure, companies will need to carefully consider the resource capacity and training needs of individuals who will be performing any incremental internal controls being implemented. The capacity and training needs of individuals responsible for performing testing over the design and operating effectiveness in support of management s evaluation of internal control over financial reporting should also be carefully considered. The top 10 focus areas on the following pages focus on some of the risks technology companies face as they evaluate their strategies and make investments in the following areas: New sources of revenue growth (mergers, acquisitions, and integration) Managing costs (contingent workforce) Information Technology management (IT asset management, cloud service management, system implementation and upgrades, and data analytics and continuous auditing/ monitoring). Risk management and regulatory compliance Foreign Corrupt Practices Act and antibribery and corruption, intellectual property protection, and COSO 2013 framework. All 10 focus areas highlight the leading exposures companies are working to address as they enter 2014.

6 4 Top 10 in 2014: Internal audit considerations for technology companies New sources of revenue growth Mergers, acquisitions, and integration Drivers: Assessing strategic risks of M&A activity, including impact on other parts of the business Implementing a more rigorous and better-controlled M&A program that identifies risks and manage these risks Obtaining validation of deal risks and expectations before they are communicated to stakeholders Enhancing execution planning, delivery, and performance tracking Improving integration processes across all key functions. A need to manage execution risk more effectively is also leading many technology companies to design additional rigor into their merger and acquisition programs to help ensure a fact-based and well-controlled diligence, valuation, integration planning, and execution process. Example activities for internal audit to consider include: Performing post mortem reviews on prior deals to assess the effectiveness of existing processes and playbooks Preparing and monitoring the adherence to accounting and internal control due diligence checklists that address key deal areas (i.e., quality of earnings and assets, cash flows, unrecorded liabilities) identify internal control gaps for both the acquired company and on a combined basis Understanding communication processes between finance, internal audit and deal teams to assess control implications of executing business process change during active integrations Performing a project risk assessment review of the business integration process, focusing on potential risks, integration success metrics, and information systems.

7 Top 10 in 2014: Internal audit considerations for technology companies 5 Managing costs Contingent workforce Drivers: Accelerating achievement of business objectives through the sourcing of temporary skills when and where it s needed Experiencing demand for flexible workforce to address technology s cyclical business levels Changing workforce (age disparity, culture) Increasing globalization and cross-border work Adopting concept of just-in-time hiring to address short term, specific needs rapidly Utilizing virtual resources (i.e., offshore versus onshore) and identifying implications to businesses across time zones. With an increased focus on flexibility and cost management as companies emerge from the global economic decline, a shift to a contingent workforce mix as part of an overall staffing strategy has gained traction as a viable option. Managed governance services, wholly outsourced functions, and select independent contractors are among the many options available today. While concerns related to intellectual property protections and knowledge retention through loss of developed internal resources remain, other key risks include: Procurement: Processes slowing the selection/on-boarding process of third-party resources (i.e., nullifying speed to market benefits) Regulatory: US federal/state laws that apply to contingent workforces (e.g., FLSA, SOX, U.S. healthcare reform) Talent management: Contingent workforce utilization should be considered in the overall business strategy, which if aligned properly with HR talent management, will allow for the proper workforce planning activities to ensure contingent workforces and internal resources alike are used in a productive manner Global mobility/expat: Staffing remote needs globally and understanding local implications through use of expatriates, management of mobile resources, and communication with/ optimization of third-party resources Example areas where Internal Audit can assist management include: Strategic review of sourcing portfolios and the service delivery model Market assessment of resource mix and related costs Change and communications guidance in conjunction with transformation initiatives Governance knowledge as it relates to vendor and sourcing portfolio management Global mobility strategy.

8 6 Top 10 in 2014: Internal audit considerations for technology companies Information technology IT asset management (hardware, software) Drivers: Reducing risk of software license noncompliance, and potential financial exposure, through proactive management of software deployments and license entitlements. Reducing unnecessary spend with software vendors by identifying: licenses not used or under used, software incorrectly deployed or configured and software licenses that have not been enhanced or consolidated. Reducing IT operational risk through provision of a complete and accurate hardware and software asset inventory (leveraged for IT security, software release management and helpdesk operations). Annual server and software expenditures can be the largest IT budget items for many technology organizations. Yet, few really focus on proactively managing these valuable assets through a wide-ranging IT or software asset management (SAM) program. In addition to cost savings, an effective program can reduce the risk and impact of unexpected software license audits (which can result in very high settlements with the vendor). Also, knowing what IT software and hardware assets you own, how many you have deployed and where, provides a vital database for IT security, and other day-to-day IT operations. Areas that would be examined by internal audit during an IT or software asset management review may include: Inventory count for selected software of total deployments and licenses purchased. This will show where the organization has any under-licensed or over-licensed software and can be used to rationalize current licensing entitlements and deployment configurations. Process and organization review of the IT asset management lifecycle from initial request for procurement through to asset retirement. This will show where there are gaps in the process and organization that may result in IT assets not being managed effectively. IT asset management tool review to check if the current tools deployed are reporting correctly (in terms of both completeness and accuracy). Cloud service management (public cloud, private cloud, data privacy) Drivers: Implementing an effective process for managing regulatory requirements postimplementation of a cloud platform Improving compliance with regulatory and legal requirements, as well as with Sarbanes-Oxley

9 Helping ensure personally identifiable information (PII) is protected as business models evolve Helping ensure availability of data which is no longer on premise. As cloud services can be delivered in different ways (e.g., Saas, Paas, and IaaS) and operational models (such as public, private, and hybrid), cloud customers face risks when moving their IT infrastructure to the cloud. The solution architecture should account for the nature of risks in the cloud environment, and determine how the provider implements controls. The greatest opportunity to mitigate or remediate risks lies with the proactive involvement of IT teams during the solutions architecture phase. Any proposed cloud approach should be evaluated for regulatory compliance before it is implemented. Cloud planning should also be monitored continuously throughout the cloud solution s life cycle (from initial design through vendor selection, implementation, usage, and decommissioning/data reclamation). Organizations need to reframe regulatory compliance as an enabling force, thereby changing how it is addressed and perceived. This would increase the successful implementation and usage of cloud technology tools in support of business objectives. Regulatory compliance in the cloud is about risk optimization, not risk avoidance, and is part of enhancing an organization s capabilities. As companies manage through the impact of continued globalization and economic recovery, an increased sense of urgency has emerged surrounding information security and privacy. If privacy and security are not addressed, organizations can be exposed to a host of risks ranging from the breach of personal information, which may lead to identity theft and access management issues, to availability and company reputation damage. By performing thorough due diligence on the overall security architecture of cloud deployments, organizations can have long-lasting reductions in the overall security and privacy risks. As technology companies increase their use of cloud platforms, these companies need to help ensure data is protected. Companies now face an increased security risk, which is why it is important to align controls to the changing environment to protect data. Areas that could be examined by internal audit during cloud information security and privacy review may include: Establishing the operating model for compliance such as the roles and responsibilities between the cloud service provider (CSP) and the company. This is driven by the type of services model engaged by the company Programs for data breach notification as required for regulatory and legal compliance Access governance program, process, and controls to help ensure inappropriate access is not permitted Management sponsorship of security and privacy programs, and level of awareness training (e.g., password protection, information risks, and appropriate handling of confidential customer/employee information) Security audits around cloud platforms System implementations and upgrades Drivers: Enabling business process improvements and reengineering goals Recognizing that legacy technology platforms are not sufficiently scalable, reliable, agile, adaptable, responsive, or extensible Identifying need for upgrades due to vendor licensing and support agreements Enabling compliance with legal and regulatory requirements Leveraging recent advances in technology for revenue generation and gaining operational efficiencies.

10 8 Top 10 in 2014 Internal Audit Considerations for Technology Companies A continued key driver for companies is aligning the technology systems to enable various components of the business strategy. In certain cases, companies are exploring upgrade options to help ensure continued vendor support for their systems. However, companies face the risk of systems implementation/upgrades not being able to deliver intended benefits and value to the business. Additional risks include budget and schedule overruns, coordination with enterprise architecture, perception of a narrow tools-only approach, and overlooking related process/people enablers. Another key challenge is successfully managing individual and organizational resistance to change. Areas that internal audit can examine during a systems implementation and upgrade review include: Business benefit and value realization is being tracked and managed throughout the project lifecycle Clear and thorough understanding of business and process requirements (with the representative set of identified stakeholders) prior to detailed design and implementation Due diligence in evaluation and selection of software package and implementation vendors Structured approach to organizational change management and business readiness Program/project management function is established appropriately to help ensure rigor around governance, transparency, stakeholder alignment, consistency, scope, and risk management Well-defined entry and exit criteria for each of the system implementation phases with early/continuous opportunities for user validation embedded throughout the various phases Alignment with current/proposed business and enterprise architecture Representative set of test cases for integration and user acceptance testing to exercise all system features and user scenarios Integration of full-time technology staff with the third-party vendor teams to help ensure smooth transition postimplementation while leveraging their institutional knowledge Data analytics and continuous auditing/ monitoring Drivers: Identifying the right audits to perform (coverage focus) Increasing the number of audits performed per year (coverage breadth) Decreasing the time required to cycle through the audit universe (coverage efficiency) Increasing the frequency of audits of key risk areas (coverage frequency) Increasing the scope of specific audits (coverage depth). The integration of data analytics tools and techniques in internal audit methodology is driving a fundamental transformation and improving audit approaches. Consider the traditional

11 Top 10 in 2014: Internal audit considerations for technology companies 9 audit approach, which is based on a cyclical process that involves manually identifying control objectives, assessing and testing controls, performing tests, and sampling only a small population to measure control effectiveness or operational performance. Fast forward to a continuous auditing approach using repeatable and sustainable data analytics and the approach becomes much more risk-based and thorough. With data analytics, technology companies have the ability to review every transaction not just a sampling which enables a more efficient analysis on a greater scale. In addition, leveraging data analytics also accommodates the growing risk based focus on fraud detection and regulatory compliance. The following are characteristics of a mature IA plan; throughout the developing, executing, and reporting phases: Automated extract, transform, and load (ETL) process System-generated analytics and dashboards are monitored by the business against specified risk criteria Aligning the strategic goals and objectives of technology companies to risk management practices Strategic objectives and risks to those objectives are monitored and prioritized on a continuous basis IA plan is dynamic and able to react to changes in the business Data analytic enabled audit programs Audit procedures are designed to verify the underlying data analysis and reporting of risk at the business level to help ensure that they are aligned with the enterprises strategic goals and objectives IA is connected to the same data and reporting as management and assesses the quality of the data and the analytics monitored by the business Automated auditing is focused on root cause analysis and management s responses to risks, including business anomalies and trigger events. Consistent use of analytics, including descriptive, diagnostic, predictive, and prescriptive elements.

12 10 Top 10 in 2014: Internal audit considerations for technology companies Risk management/regulatory compliance US Foreign Corrupt Practices Act (FCPA) and Antibribery and Corruption (ABC) Compliance Drivers: Identifying emerging regulatory and compliance risk, such as that introduced by organic expansion into new markets, third parties, acquired businesses Providing insight to stakeholders regarding the effectiveness of existing antibribery and corruption compliance activities Preserving the company s ability to control when it discloses a potential violation to the regulators, if at all. How significant a risk is bribery and corruption? According to some estimates, the average cost related to the resolution of an FCPA matter was more than $80 million in 2013, representing DOJ and SEC fines, penalties, disgorgement, and prejudgment interest. Viewed in this context, it is easy to understand the amount of attention companies have paid to understanding their bribery and corruption exposure and to evaluating their current compliance programs. Technology companies are particularly vulnerable to bribery and corruption risks posed by third parties such as distributors, channel partners, agents, intermediaries, consultants, representatives, contractors and suppliers, consortia, and joint venture partners. An ounce of prevention The benefits of an effective antibribery and corruption compliance program, calibrated for a company s specific risk profile, are clear. Clearly written policies that spell out prohibited activity, the commitment of executive management to antibribery and corruption efforts, periodic training, audit clauses in agreements with third parties, and vigilance by compliance personnel can deter bribery and corruption, thereby reducing the risk of costly and disruptive regulatory enforcement activity. Should the unthinkable occur, a well designed and executed antibribery and corruption compliance program may mean the difference between a prosecution and a nonprosecution agreement, and may even reduce the amount of monetary fines and penalties levied. Internal audit can play a vital role in an organization s antibribery and corruption efforts by: Conducting a gap assessment of the organization s existing antibribery and corruption procedures in relation to leading practice, regulatory guidance Providing assurance regarding the design and operating effectiveness of the organization s applicable preventative and detective controls Collaborating with the business to improve existing antibribery and corruption procedures Enhancing internal audit return on investment by embedding antibribery and corruption procedures into its existing/ scheduled audits and third-party oversight activities Surfacing bribery and corruption risk through data analytics, third-party audits Lending resources to or leading investigations into matters involving potential noncompliance Driving continuous improvement through testing and evaluation of the organization s antibribery and corruption program.

13 Intellectual property protection Drivers: Management and protection of IP is of utmost importance to virtually all technology companies Achieving protection of IP assets from loss or overuse Ensuring IP management processes are in line with internal and external compliance requirements Identifying IP related contracts with self reporting requirements Recognizing IP strategy is not aligned with business or product strategy. Every day, businesses lose countless dollars without even realizing it. In many cases, revenue can vanish because vendors, distributors, and licensees unintentionally fail to meet contractual obligations. Today, intellectual property (IP) is at the core of, and a key enabler of, many business relationships. As business increasingly takes place through a network of separate entities joint ventures, alliances, and less-structured arrangements IP makes it possible to share intangible assets in an effective ecosystem that spans the globe. Many organizations license their valuable intellectual property trade secrets, designs, patents, and trademarks or share them with other third parties (e.g., vendors for use in contract manufacturing or channel partners for comarketing efforts). IP-related risk can stem from highly complex contracts that do not identify key requirements or responsibilities clearly, or from changed circumstances, mistakes, or deliberate misstatements, but managing IP means more than enforcement. IP can be sold or licensed for revenue, to support tax-efficient structures or as collateral for borrowing. Whatever the situation, the need to manage risks related to third-party IP relationships is critical to delivering significant bottom-line benefits. Internal audit can support these efforts with: Compliance by reviewing and monitoring the compliance of third-party IP contracts (both internally and externally) to help protect the bottom line and nonfinancial impacts (e.g., unlicensed transfer of IP to restricted countries). These contracts can include brand, technology, and software rights. It can also cover grey market and channel distribution/reseller agreements. Process review with an internal audit or SOX review specifically related to IP processes, consider all elements of the IP lifecycle including: IP protection, IP management, and IP enforcement. Global mobility workforce Drivers: Increasingly international-oriented workforce amongst high growth technology companies Mitigating changing and emerging risks, including an evolving and increasingly complex regulatory global tax environment Reducing costs and driving business value through improved quality and service Increasing workplace productivity, employee attraction, and retention Helping to uncover potential savings Implementing ideas and methodologies to increase the efficiency and effectiveness of assignment programs Identifying process improvements that support global corporate goals and compliance initiatives. Our member firm s clients grow in many instances by way of international expansion. By operating in new countries or increasing their presence in a country, there s an inherent need to grow the workforce to create the organizational capability it needs to realize its business goals and objectives. A major way to get key talent into these countries is through using international assignments. Deploying personnel cross-border involves many inherent cost and compliance implications and requires a great effort to manage new regulatory environments.

14 12 Top 10 in 2014: Internal audit considerations for technology companies Internal audit can assist management with these challenges across multiple departments by assessing the following: Review cost management processes to help ensure appropriate forecasting, accrual management, authorizations, and intercompany cross-charging Review payroll processes to determine calculation and reporting of pay (including multiyear incentive compensation) to local revenue authorities is accurate and timely Review human resources data management compliance relative to relevant data privacy provisions and security mandates Determine if existing organizational IT systems may be sufficient to manage the tracking, compliance, and task management functions of maintaining a global workforce Help ensure there are processes and resources to keep pace with of regulatory change keeping up with tax law changes requires extensive global knowledge, experience, and resources. Alignment to COSO 2013 framework Drivers: Updated internal control framework issued on May 14, 2013 which companies need to comply with by December 15, With the release of COSO 2013 framework, companies both small and large have taken note of the key changes, some of which include the following: changes in business and operating environments, expanded operations and reporting objectives, increased relevance and dependence on IT, and fraud risk assessments and response. The new framework suggests, for internal control to be effective, each of the 17 newly developed principles must be present and functioning in a coordinated manner. Recognizing the importance of the COSO 2013 framework, many internal audit organizations within technology companies have begun a process to align their existing processes and control structure to meet the new framework guidelines. Identify and discuss control design gaps with senior management and develop plans to remediate any such gaps. Perform an assessment of the impact of the 2013 framework on your organization s policies, guidance, training, and related tools. Work with senior and line management to communicate the impact of the 2013 framework on the organization to internal audit and the board/ audit committee. Discuss with the audit committee the impact of the 2013 framework on internal audit s operations and plans. Areas that internal audit can examine during a COSO 2013 alignment review include: Develop your plan to transition from the 1992 COSO framework to the 2013 COSO framework. Map the 17 principles and points of focus to your existing controls or controls the organization is contemplating in an organizational transformation within each component to demonstrate where the relevant principles are present and functioning in support of the objectives.

15 Top 10 in 2014: Internal audit considerations for technology companies 13

16 14 Top 10 in 2014: Internal audit considerations for technology companies About KPMG

17 Top 10 in 2014: Internal audit considerations for technology companies 15 KPMG: An experienced team, a global network KPMG s Internal Audit technology professionals combine industry knowledge with technical experience to provide insights that help technology leaders take advantage of existing and emerging technology opportunities and proactively manage business challenges. Our professionals have extensive experience working with global technology companies ranging from FORTUNE 500 companies to pre-ipo start-ups. We go beyond today s challenges to anticipate the potential long- and short-term consequences of shifting business, technology. About the authors Ron Lopes Ron is a partner in KPMG s Advisory practice and has more than 25 years of experience in the Silicon Valley. Ron has significant experience guiding the delivery of services to many leading multinational technology companies to help them create high-value-added risk and business management processes. Ron has worked on a multitude of projects for clients, including Sarbanes-Oxley (SOX) Section 404 compliance efforts, internal audits, financial and operational control reviews, risk assessments, third-party compliance audits, process reviews, financial statement audits and process improvement engagements. Ron has developed and implemented high-impact risk assessment and audit planning methodologies as well as self-assessment strategies for internal audits. Ron has significant experience in revenue recognition, financial reporting, and benchmarking/leading practices. A significant portion of his career has involved assisting clients with the coordination and execution of large international projects, and objectives. Mariam Barar Mariam Barar is a Director in KPMG s Risk Consulting practice in the Silicon Valley Office. Mariam has experience with overseeing client engagements for Fortune 500 companies in the Technology Sector. She has expertise in developing and implementing Sarbanes-Oxley (SOX) Section 404 compliance programs, internal controls, and working with large scale global teams.

18 16 Top 10 in 2014: Internal audit considerations for technology companies

19 Top 10 in 2014: Internal audit considerations for technology companies 17

20 Contact us Gary H Matuszak Global Chair, KPMG s Technology, Media & Telecommunications practice T: E: gmatuszak@kpmg.com Richard Hanley National Advisory Industry Leader, KPMG s Technology, Media & Telecommunications practice T: E: rhanley@kpmg.com Tom Lamoureux Global Advisory Technology Industry Leader T: E: tlamoureux@kpmg.com Ron Lopes Partner, Advisory T: E: rjlopes@kpmg.com kpmg.com The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. Printed in the U.S.A. The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International. NDPPS

KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com

KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com KPMG Internal Audit: Top 10 considerations in 2015 for technology companies kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Our annual compilation of Internal Audit considerations for technology

More information

Internal audit. for technology companies. Additional information in Univers 45 Light 12pt on 16pt leading. kpmg.com kpmg.com

Internal audit. for technology companies. Additional information in Univers 45 Light 12pt on 16pt leading. kpmg.com kpmg.com Top SECTORS 10 in AND 2013: THEMES Internal audit Title considerations here for technology companies Additional information in Univers 45 Light 12pt on 16pt leading kpmg.com kpmg.com Credits and authors

More information

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com KPMG Internal Audit 2015: Top 10 considerations for private equity firms kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Historically, private equity has been less regulated than other parts of

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Arm Stakeholders with Critical Information to Assess 3rd Party Relationships and Comply with the Foreign Corrupt Practices Act

More information

U.S. Inbound Tax Services

U.S. Inbound Tax Services TAX U.S. Inbound Tax Helping foreign companies achieve tax-efficiency in their U.S. operations kpmg.com 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Contract Compliance Services

Contract Compliance Services Contract Compliance Services Deriving greater value from your third-party relationships kpmg.com 1 / KPMG s Evolving World of Risk Management Managing the risk and enhancing the value of commercial relationships

More information

IT Transformation. Moving Beyond Service Management to a Strategic Business Role. August 2013. kpmg.com

IT Transformation. Moving Beyond Service Management to a Strategic Business Role. August 2013. kpmg.com IT Transformation Moving Beyond Service Management to a Strategic Business Role August 2013 kpmg.com KPMG surveyed over 275 attendees at ServiceNow s Knowledge13 conference, here is what we learned. Key

More information

Vendor Risk Management in the New Regulatory Environment. kpmg.com

Vendor Risk Management in the New Regulatory Environment. kpmg.com Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators

More information

Driving business performance Using data analytics

Driving business performance Using data analytics Driving business performance Using data analytics January 2016 kpmg.com About data analytics Many companies are overlooking a significant opportunity to enhance decision making and improve performance

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

Driving Business Value. A closer look at ERP consolidations and upgrades

Driving Business Value. A closer look at ERP consolidations and upgrades IT advisory SERVICES Driving Business Value A closer look at ERP consolidations and upgrades KPMG LLP Meaningful business decisions that help accomplish business goals and growth objectives may call for

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Practical and ethical considerations on the use of cloud computing in accounting

Practical and ethical considerations on the use of cloud computing in accounting Practical and ethical considerations on the use of cloud computing in accounting ABSTRACT Katherine Kinkela Iona College Cloud Computing promises cost cutting efficiencies to businesses and specifically

More information

An Enterprise Resource Planning Solution (ERP) for Mining Companies Driving Operational Excellence and Sustainable Growth

An Enterprise Resource Planning Solution (ERP) for Mining Companies Driving Operational Excellence and Sustainable Growth SAP for Mining Solutions An Enterprise Resource Planning Solution (ERP) for Mining Companies Driving Operational Excellence and Sustainable Growth 2013 SAP AG or an SAP affi iate company. All rights reserved.

More information

agility made possible

agility made possible SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate

More information

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security

More information

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Tax @ KPMG. kpmgcampus.com

Tax @ KPMG. kpmgcampus.com Tax @ KPMG kpmgcampus.com b Tax @ KPMG Tax @ KPMG 1 We are making a significant investment in our people to help them grow and develop at KPMG Tax. Skip Robichaux, Tax Partner and People Leader The world

More information

Continuous Auditing / Continuous Monitoring

Continuous Auditing / Continuous Monitoring Continuous Auditing / Continuous Monitoring Using Technology to Drive Value by Managing Risk and Improving Performance KPMG LLP Introduction As business risks of all kinds continue to proliferate, management

More information

Protecting your brand in the cloud Transparency and trust through enhanced reporting

Protecting your brand in the cloud Transparency and trust through enhanced reporting Protecting your brand in the cloud Transparency and trust through enhanced reporting Third-party Assurance November 2011 At a glance Cloud computing has unprecedented potential to deliver greater business

More information

The New Third-Party Oversight Framework: Trust but Verify kpmg.com

The New Third-Party Oversight Framework: Trust but Verify kpmg.com Financial Services Regulatory Point of View The New Third-Party Oversight Framework: Trust but Verify kpmg.com The New Third-Party Oversight Framework: Trust but Verify 1 Financial services regulatory

More information

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.

More information

Credit Union Liability with Third-Party Processors

Credit Union Liability with Third-Party Processors World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with

More information

Best Practices in Contract Migration

Best Practices in Contract Migration ebook Best Practices in Contract Migration Why You Should & How to Do It Introducing Contract Migration Organizations have as many as 10,000-200,000 contracts, perhaps more, yet very few organizations

More information

ADVISORY SERVICES. Risk management in an evolving world. Making the case for social media governance. kpmg.com

ADVISORY SERVICES. Risk management in an evolving world. Making the case for social media governance. kpmg.com ADVISORY SERVICES Risk management in an evolving world Making the case for social media governance kpmg.com Risk management in an evolving world 3 Why good governance should be the foundation of your social

More information

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency kpmg.com Leveraging data analytics and continuous auditing processes 1 Executive

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS 2015 www.bdo.com For more information on BDO USA s service offerings to this industry vertical, please contact one of the regional service leaders below: TIM CLACKETT Los Angeles 310-557-8201 / tclackett@bdo.com

More information

Transforming risk management into a competitive advantage kpmg.com

Transforming risk management into a competitive advantage kpmg.com INSURANCE RISK MANAGEMENT ADVISORY SOLUTIONS Transforming risk management into a competitive advantage kpmg.com 2 Transforming risk management into a competitive advantage Assessing risk. Building value.

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

KPMG s Financial Management Practice. kpmg.com

KPMG s Financial Management Practice. kpmg.com KPMG s Financial Management Practice kpmg.com 1 KPMG s Financial Management Practice KPMG s Financial Management (FM) practice, within Advisory Management Consulting, supports the growing agenda and increased

More information

Sarbanes-Oxley Compliance for Cloud Applications

Sarbanes-Oxley Compliance for Cloud Applications Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this

More information

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper Right-Sizing Electronic Discovery: The Case For Managed Services A White Paper 1 2 Table of Contents Introduction....4 An Overview of the Options...4 Insourcing: Bringing E-Discovery Processes In-House....4

More information

Software Asset Management on System z

Software Asset Management on System z Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager mzelle@us.ibm.com Agenda Why Software Asset Management (SAM) The Discipline of Software

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector

Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector Online learning is playing a critical role in the delivery of Teaching and Learning and the overall experience

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for

More information

IBM Tivoli Netcool network management solutions for enterprise

IBM Tivoli Netcool network management solutions for enterprise IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Accenture Technology Consulting. Clearing the Path for Business Growth

Accenture Technology Consulting. Clearing the Path for Business Growth Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers

More information

Compliance Risk Management Survey A Point of View

Compliance Risk Management Survey A Point of View FINANCIAL SERVICES Compliance Risk Management Survey A Point of View July 2014 kpmg.com Compliance Risk Management Survey A Point of View 3 Introduction As the financial crisis unfolded, regulators looked

More information

Software asset management White paper. Improving IT service delivery through an integrated approach to software asset management.

Software asset management White paper. Improving IT service delivery through an integrated approach to software asset management. Software asset management White paper Improving IT service delivery through an integrated approach to software asset management. September 2008 2 Contents 2 Introduction 3 The challenges of managing software

More information

8/12/2013. Then. Now. Managing risk and compliance. August 14, 2013

8/12/2013. Then. Now. Managing risk and compliance. August 14, 2013 GLOBAL/INTERNATIONAL PAYROLL THE GROUND WORK August 14, 2013 Then Identifying & tracking the assignees Drafting a policy document Implementing a mobility process Deploying an assignment management system

More information

Transforming Internal Audit: A Maturity Model from Data Analytics to Continuous Assurance

Transforming Internal Audit: A Maturity Model from Data Analytics to Continuous Assurance ADVISORY SERVICES Transforming Internal Audit: A Model from Data Analytics to Assurance kpmg.com Contents Executive summary 1 Making the journey 2 The value of identifying maturity levels 4 Internal audit

More information

FCPA 10 Hallmarks Self- Assessment

FCPA 10 Hallmarks Self- Assessment FCPA 10 Hallmarks Self- Assessment How exposed is your business to corruption risk? Take this assessment to find out if your systems are sufficiently robust to protect your business October 2014 Prepared

More information

Insurance Industry Expertise

Insurance Industry Expertise Insurance Industry Expertise Delivered With High-Level Attention and Service Audit Tax Advisory Risk Performance The Unique Alternative to the Big Four For more than 50 years, clients in all sectors of

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,

More information

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are

More information

Software License Compliance Review

Software License Compliance Review SoftSummit 2009 Preparing for a Software Vendor Compliance Review: Improving Response and Realizing Cost Savings Through SAM Presented by: Bruce Vanderbush Partner Christopher Ruhl Director October 21,

More information

Global Payroll? A Few Planning Considerations. Human Resources Globalization

Global Payroll? A Few Planning Considerations. Human Resources Globalization Global Payroll? A Few Planning Considerations Human Resources Globalization Global Payroll? A Few Considerations Today s businesses operate in an increasingly global environment. As a result, globalizing

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Managed Services - Driving Business Value in Banking

Managed Services - Driving Business Value in Banking White Paper Managed services for credit solutions: Driving business value in banking Business solutions through information technology Entire contents 2005 by CGI Group Inc. All rights reserved. Reproduction

More information

Running the business of IT metrics that matter

Running the business of IT metrics that matter INFORMATION TECHNOLOGY SERVICES Running the business of IT metrics that matter November 2014 kpmg.com Contents Introduction... 2 Do you have the right KPIs to run IT as a business?... 4 Data is not the

More information

THE PRESCRIPTION FOR A PAINLESS AUDIT

THE PRESCRIPTION FOR A PAINLESS AUDIT BEYOND TOOLS: BUSINESS INTELLIGENCE MEETS ANALYTICS THE PRESCRIPTION FOR A PAINLESS AUDIT Frank Venezia, Siwel Consulting, Inc. Steffani Lomax, Siwel Consulting, Inc. White Paper - December 2014 The Prescription

More information

KPMG LLP Credit Risk Management Practices 2014 Survey on Credit Bureau Reporting

KPMG LLP Credit Risk Management Practices 2014 Survey on Credit Bureau Reporting KPMG LLP Credit Risk Management Practices 2014 Survey on Credit Bureau Reporting July 2014 kpmg.com Introduction Dear Colleagues: Credit reports play an important role in the lives of consumers. As the

More information

White paper September 2009. Realizing business value with mainframe security management

White paper September 2009. Realizing business value with mainframe security management White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment

More information

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014 KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Talent DNA that drives your business

Talent DNA that drives your business Talent DNA that drives your business Align your talent DNA and business strategy to achieve real success Accelerate your business with a strategic HCM solution that turns your human capital investment

More information

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3 /01 PROJECT ADVISORY Stakeholder management and communication Leadership Series 3 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital programmes,

More information

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,

More information

KPMG Powered Enterprise

KPMG Powered Enterprise KPMG Powered Enterprise Driving Oracle Cloud-enabled business transformation kpmg.com KPMG Powered Enterprise / 1 Introduction Organizations generally resist changes to their enterprise systems. What

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive

More information

IT Insights. Managing Third Party Technology Risk

IT Insights. Managing Third Party Technology Risk IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

An Enterprise Resource Planning Solution for Mill Products Companies

An Enterprise Resource Planning Solution for Mill Products Companies SAP Thought Leadership Paper Mill Products An Enterprise Resource Planning Solution for Mill Products Companies Driving Operational Excellence and Profitable Growth Table of Contents 4 What It Takes to

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES A CONSULTATION REPORT OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS STANDING COMMITTEE 3 ON MARKET INTERMEDIARIES

More information

SUSTAINING COMPETITIVE DIFFERENTIATION

SUSTAINING COMPETITIVE DIFFERENTIATION SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Technical Management Strategic Capabilities Statement. Business Solutions for the Future Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Part 3: Business Case and Readiness

Part 3: Business Case and Readiness The Fundamentals of Managed Service Provider (MSP) Programs Part 3 of 3 Part 3: Business Case and Readiness By Jennifer Spicher contents This is the final of a three-part series designed to outline key

More information

Software Asset Management: Risk and Reward. March 2015

Software Asset Management: Risk and Reward. March 2015 Software Asset Management: Risk and Reward March 2015 Agenda What Are the Risks Direct Risks Indirect Risks Future Risks How to Assess the Risks Maturity Frameworks Compliance Assessments Mitigating the

More information

The changing lens of information security kpmg.com

The changing lens of information security kpmg.com IT ADVISORY SERVICES The changing lens of information security kpmg.com 2 Section or Brochure name The changing lens of information security Enabling business via information protection programs Contents

More information

Title here. Successful Business Model Transformation. in the Financial Services Industry. KPMG s Evolving World of Risk Management SECTORS AND THEMES

Title here. Successful Business Model Transformation. in the Financial Services Industry. KPMG s Evolving World of Risk Management SECTORS AND THEMES SECTORS AND THEMES Successful Business Model Transformation Title here in the Financial Services Industry Additional information in Univers 45 Light 12pt on 16pt leading KPMG s Evolving World of Risk Management

More information

Fraud-Related Compliance

Fraud-Related Compliance Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

Risk management and the transition of projects to business as usual

Risk management and the transition of projects to business as usual Advisory Risk management and the transition of projects to business as usual Financial Services kpmg.com 2 Risk Management and the Transition of Projects to Business as Usual Introduction Today s banks,

More information

zoomlens January 2012 Why General Counsel should care about Software Asset Management

zoomlens January 2012 Why General Counsel should care about Software Asset Management zoomlens January 2012 Why General Counsel should care about Software Asset Management An organization s ability to maintain compliance with its contractual obligations and manage costs depends on whether

More information

Anti-Money Laundering controls in Mergers & Acquisitions

Anti-Money Laundering controls in Mergers & Acquisitions White Paper Anti-Money Laundering controls in Mergers & Acquisitions June 2014 Anti-Money Laundering controls in Mergers & Acquisitions Authors: Ana L. Pereira and Ana Maria H. de Alba Caveat emptor let

More information

How To Ensure Financial Compliance

How To Ensure Financial Compliance Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview

More information

White Paper Achieving SOX Compliance through Security Information Management. White Paper / SOX

White Paper Achieving SOX Compliance through Security Information Management. White Paper / SOX White Paper Achieving SOX Compliance through Security Information Management White Paper / SOX Contents Executive Summary... 1 Introduction: Brief Overview of SOX... 1 The SOX Challenge: Improving the

More information

Surviving Software Audits

Surviving Software Audits Volume 7 Issue 5 1 Surviving Software Audits Audit Prevention Strategies and Successful Audit Processes By: Frank Venezia Vice President, Siwel Consulting, Inc. By: Steffani Lomax Director of ITAM Business

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

Outperform Financial Objectives and Enable Regulatory Compliance

Outperform Financial Objectives and Enable Regulatory Compliance SAP Brief Analytics s from SAP SAP s for Enterprise Performance Management Objectives Outperform Financial Objectives and Enable Regulatory Compliance Drive better decisions and streamline the close-to-disclose

More information

www.pwc.com Navigating the next generation of cloud ERP Insurance

www.pwc.com Navigating the next generation of cloud ERP Insurance www.pwc.com Navigating the next generation of cloud ERP Insurance Agenda 1. Cloud computing 2. Cloud and the future of financial management 3. Insurance trends 4. Cloud readiness Summary 2 If you are currently

More information

Developing a Free Credit Score Program. kpmg.com

Developing a Free Credit Score Program. kpmg.com Developing a Free Credit Score Program kpmg.com Developing a Free Credit Score Program 1 Introduction U.S. regulators, including the Consumer Financial Protection Bureau (CFPB), have begun urging lenders

More information

Compliance trends and practices to increase revenue kpmg.com

Compliance trends and practices to increase revenue kpmg.com Is unlicensed software hurting your bottom line? Compliance trends and practices to increase revenue kpmg.com contents 1 introduction 2 executive summary 6 KPMG s top 10 recommendations 8 detailed findings

More information

Security in the Cloud: Visibility & Control of your Cloud Service Providers

Security in the Cloud: Visibility & Control of your Cloud Service Providers Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,

More information